Cameron Baker RIT CSL
Senior Systems Engineer
Par Government Systems Corporation
 

Cameron Baker is currently employed as a Senior Systems Engineer with PAR Government Systems Corporation (PGSC) and is the RIT division Cyber Security Liaison at AFRL.  He has a bachelor’s degree in Telecommunications from SUNY POLY (formerly SUNYIT) and currently working towards his Master’s in Network Computer Security also from SUNY POLY.  His current certifications include CompTIA A+, Network+, Security+, and Linux+

Cameron has professionally worked in the field for 10 years on projects such as High Performance Computing (HPC), System Administration, Network Infrastructure Design, Cyber Security, Tactical Radios, Network Emulation, Web Development, and Software Development.

 
Tim Ball
Assistant Professor of Cybersecurity
Utica College 
 

Tim Ball, Assistant Professor of Cybersecurity, has worked in the field of computer electronics and data communications while he tinkered with computer hardware and software on the side. Finally deciding to get serious about the computer industry, Tim returned to school, earned his Bachelor's degree in Computer Science, and took a job as a Software Engineer designing and coding Navy weather analysis systems. Shortly thereafter, Tim once again returned to school and earned a Master's degree in Computer Science and a Graduate Certificate in Digital Forensics from the University of Rhode Island and started work at the Naval Undersea Warfare Center. At NUWC, Tim was the lead Information System Security Engineer, and as such was responsible for the Information Assurance of periscope systems on Navy submarines. While working at NUWC, 

Tim was recruited by the Air Force to work at the Air Force Research Laboratory (AFRL) in Rome, NY. During this time, Tim continued his studies at URI and earned his Ph.D. in Computer Science shortly after taking the job at AFRL. At AFRL, Tim was the in-house research lead for Offensive Cyber Operations and Subject Matter Expert for many DARPA programs. He has also sat on multiple scientific review boards for the Defense Advanced Research Projects Agency (DARPA). 

When Tim isn't in the classroom or lab, he can usually be found in the gym where he loves to lift things up and put them down. Tim also holds certifications as a Certified Ethical Hacker and Certified Information System Security Professional. Tim is also a Microsoft Certified System Engineer and a Microsoft Certified Professional. Tim has received the National Collegiate Computer Science Award and the United States Achievement Academy's All-American Scholar Award. He is a member of the Academic Honors Society and the Computer Science Honors Society.

 

Jason Bays, CFP®

Financial Advisor

 

Jason has been a financial advisor for 8 years, and holds Series 6, 7, 65 and 63 with LPL Financial, as well as life, accident, and health licenses. His areas of specialty include healthcare and higher education. He holds a B.S. from Robert Wesleyan College (’07) and is CFP® certified in insurance planning, financial planning, tax planning, and investment planning.

 

Gary Braglia

Security Specialist

GreyCastle Security
 garybraglia

Gary Braglia is a Security Specialist at GreyCastle Security with over 10 years of experience as an IT professional. Gary began his career as an application developer with the NYS Office of Information Technology Services (ITS), is a graduate of SUNY Albany with a Master’s degree in Information Science (M.S.I.S.) and the owner of industry-recognized certifications including Tenable Certified Network Auditor (TCNA) and CompTIA Security+. At GreyCastle, Gary consults with clients in a wide range of security domains, including penetration testing, vulnerability assessments, security assessments, network security, application security and policy development.

 
Stuart Card
AX Enterprize, LLC
 

Dr. Card has 30 years of experience in computing and related fields. He currently leads several U.S. Air Force funded R&D efforts to escape the "Red Queen's race" of perpetually patching vulnerabilities.

 
Robert Coccaro
 
 
Dan Didier
Chief Security Strategist
GreyCastle Security
 
Dan Didier (MSIA, CCSP, TSS) is an entrepreneur, speaker, founder of NetSecureIA and Chief Security Strategist at GreyCastle Security. 
With nearly 16 years of security experience in a wide range of industries including critical infrastructure, finance, healthcare, manufacturing and other prominent industries, Dan brings extensive expertise as a technical security engineer and business-focused risk manager. 
Dan's unique background allows him to bridge the gap between people, process and technology and adapt to the unique cybersecurity challenges that organizations face today.
 
Jeff Foley
Chief Technology Officer
ClaritySec
 

Jeff Foley is the Chief Technology Officer for ClaritySec, he sits on several cyber security advisory boards, and his work has been featured within the DoD, DHS, and the Intelligence Community, as well as many universities and Fortune 500 companies.  He is an accomplished technologist known for developing and delivering game-changing research findings to help overcome real-world challenges in federal, commercial and academic problem spaces. By leveraging a mix of information security research leadership and IT security expertise, Mr. Foley shares his knowledge and insight to assist government, businesses, students and professionals achieve their missions and objectives in the ever-changing cyberspace domain.  In his spare time, Mr. Foley enjoys experimenting with new blends of coffee, supporting local university’s cybersecurity programs, and participating in information security competitions, such as DEF CON Capture the Flag.

 
James Garrisi
Lead Engineer
Booz|Allen|Hamilton
 
 

Erin Gordon

Team Lead, Business Development
 

Erin Gordon is a Solutions Specialist for GreyCastle Security on the Business Development team.

With 7+ years' experience in client and project management, Erin brings the ability to identify and understand an organization's cybersecurity challenges and recommend appropriate risk management efforts.

 
Reg Harnish
CEO
GreyCastle Security
 
Reg Harnish is an entrepreneur, speaker, author and the CEO for GreyCastle Security, a leading cybersecurity consulting firm headquartered in Troy, NY. 
Reg has been practicing security for nearly two decades, specializing in security solutions for healthcare, higher education, critical infrastructure and other industries. Reg's security expertise ranges from risk management and incident response to regulatory compliance and awareness. Reg brings a thought-provoking perspective to the industry and strives to promote awareness, security "thinking" and practical application of security fundamentals. 
As the CEO for GreyCastle Security, Reg is responsible for defining and executing the company's vision. Reg has led the organization to four consecutive years of triple-digit growth while establishing GreyCastle Security as a highly-respected thought leader. GreyCastle Security is currently working with organizations in nearly every state in the United States, including Fortune 5000 and Global 100 organizations. 
Reg attended Rensselaer Polytechnic Institute, and has achieved numerous security and industry certifications, including CISSP, CISM, CISA and ITIL. Reg has achieved various physical security certifications, including firearms instruction and personal protection. Reg is a graduate of the FBI Citizens Academy. 
Reg is a fellow of the National Cybersecurity Institute, a cybersecurity educational institution located in Washington, DC. Reg serves on numerous security association boards and is currently an advisor to several educational institutions focused on cybersecurity. 
Reg is a nationally-recognized speaker and has presented at countless industry events, including BSides, ISSA, ISC2, ISACA, ASIS, DHS and InfraGard. Reg's successes have been featured in leading industry journals, including Software Magazine, ComputerWorld and InfoWorld. Reg is a contributor to numerous security publications and has co-authored several books on cybersecurity awareness.
 

Michael Hartley

Technologist

 
 
Rob Kwiatkowski
Systems Engineer
Extreme Networks, Inc
 

Systems Engineer with 20+ years of progressively responsible IT/Telecom/Security experience.

 
Francis Lee  

Francis Lee is a technology enthusiast with interests in security and engineering. In the 90s he began as an innocent Applesoft Basic programmer reading the "MIT Guide to Lock Picking" with a passing interest in security analysis. He eventually grew into a responsible Software Engineer/Developer for research projects, while entertaining his curiosities by playing with electrons in embedded devices and affecting the physical realm in 3d Printing and Lock Picking. Although currently unemployed, Francis enjoys utilizing his spare time in sharing the good news of open source software, opening the minds of children and adults to the possibilities of accessible fabrication technology, and ranting about the lack of common sense security in both the real and virtual worlds.

 
Nelson Lee
Information System Security Manager
Air Force Research Laboratory's Information Directorate
 nelsonlee

Growing up in the projects of NYC, Nelson Lee discovered hacking at the age of 10 in a public library where he spent most of his childhood, trying to stay out of trouble. He learned to shoulder surf the librarian's logon credentials so that he could extend his time on this new thing called a computer, in order to learn more about the Internet. His curiosity led him to reverse engineering, phreaking 'Ma Bell', and anonymous messages on bulletin board systems. This same curiosity led him to C programming in high school, where he was accused of plagiarism for writing and using his own software libraries. His focus on information security remained through college where he wrote buffer overflows, performed cryptonalysis on algorithms such as triple-DES and power utilization side channel attacks on ASICs. He earned his Bachelors in Computer Science from Polytechnic University, which is now part of NYU. Leaving the theoretical and moving towards the practical, he earned his Masters degree in Information Technology from Rensselaer Polytechnic Institute in 2008. A believer in life-long learning, he recently completed his second Masters degree in Cybersecurity from the University of Maryland this past May. He was invited and inducted into the Phi Kappa Phi National Honor Society, an achievement reserved for the top 10% of the graduating class. He currently serves as the Information System Security Manager for the Air Force Research Laboratory's Information Directorate, where he oversees and executes the organization's cybersecurity program affecting approximately 2000 employees and 17,000 IT assets. In his spare time, he is learning the Raspberry PI and Arduino platforms in order to teach his kids STEM.

 
Bryan Matthews
Systems Engineer
PAR Government Systems Corporation
 

Bryan Matthews is  currently employed with PAR Government Systems Corporation (PGSC) as a Systems Engineer.  He is a BA CIS graduate of SUNY POLYTECHNIC INSTITUTE (SUNY PI) formerly SUNYIT.  His current certifications include, CompTIA’s Security+ and Network+ and a Bacula Systems Admin 1 certification.

Bryan has professionally worked in the field for 3 years and worked on projects ranging from High Performance Computing (HPC) and Network R&D, Custom Linux Filesystems and Kernels, System Administration of Artificial Intelligence (AI) and Neural-Networks, Software Defined Networking (SDN), and Brain-Computing Interface (BCI).

 
George Palmer
Technical Lead
AX Enterprize, LLC
 

 Mr. Palmer is a multi-disciplined engineer with over 30 years of experience in military aerospace and communications systems and is Technical Lead for AX Enterprize's UAS business area.  His current research involves unique uses of software defined radios for detection, coercion, and exploitation of UAV systems.

 
Luke Pomichter  
 
Michael Rash
Director, Security and Compliance
Extreme Networks, Inc
 

Published author on Linux firewalls and intrusion detection technologies. Creator of Single Packet Authorization (SPA) for strong service protection. Director - Security and Compliance, open source developer, security architect, architect of secure software design and verification. Speaker at security conferences. Vulnerability tracking and defense life cycle management. PCI and HIPAA compliance architect.

 
Val Red
Cyber Integration Program Manager
Information Directorate
Air Force Research Laboratory
 
Val Red is a Cyber Integration Program Manager at the Air Force Research Laboratory Information Directorate, managing a collaborative enclave of system administrators and secure application developers investigating, testing, and assessing new technologies for their readiness to transition into operational, production network environments.  He earned his undergraduate Bachelor of Science degree in Electrical & Computer Engineering at Rutgers University, the State University of New Jersey at New Brunswick, NJ in 2014.  Most recently, he earned his Master's Degree in Cybersecurity with a concentration of Cyber Operations at Utica College earlier this year.  Having grown up with computers and the Internet, he started off building and securing web applications for local businesses in his hometown of Jersey City, NJ as far back as his preteen years. During his junior and senior years in undergraduate engineering, he also served as a webmaster and system administrator, respectively, for the Rutgers' Mathematical Finance graduate program and Rutgers Engineering Computing Services, respectively. 
When he is not trying to hack things in development in order to secure them for production, Val enjoys photography. More often than not, however, you can find him hacking whatever hardware or software piques his interest at a given moment, including the three Raspberry Pi's he has at home, or various computer games he decided to hack out of curiosity. Among his most recent achievements, he ranked number 10 out of 483 infosec practitioners in the 2015 SANS ICS Cyber Security Challenge. 
 
Timothy Reed
Adeptus Cyber Solutions, LLC
 

Mr. Reed is Principal Engineer and Owner of ACS and is responsible for overseeing all R&D efforts. He has 15 years of experience in DoD contracting and a wide range of skills from software development, systems administration, to offensive and defensive cyber. Mr. Reed maintains his CISSP (Certified Information Systems Security Professional), Security+ and OSCP (Offensive Security Certified Professional) certifications.
Mr. Reed has recently been working as a penetration tester and information assurance specialist testing Cross Domain Systems (CDS) for the Integration Test and Evaluation Center (ITEC) at AFRL-Rome. His work has greatly benefited the test team by bringing years of offensive and defensive cyber, streaming video and networking experience. Mr. Reed’s work on testing CDSes has resulted in significant security findings with-in the systems under test. Part of his work included introducing malware and viruses into video streams, creating alternate channels for getting malware through file transfer CDSes and modification of network packets in an effort to exploit the network stack.
As a Senior Cyber Engineer for Northrop Grumman, he was the lead on an offensive cyber capability to detect operating systems based on their network stack. Mr. Reed was also the lead on several penetration tests that were performed against government agencies. He was responsible for tasking the other engineers on the team, writing the final report and delivering the results to the customer.
Mr. Reed has performed Android malware analysis in an academic environment during the pursuit of his masters.
 
Steve Stasiukonis 
President
Secure Network Technologies
 

Steve serves as President of Secure Network Technologies, focusing on Penetration Testing, Information Security Risk Assessments, Incident Response and Digital Investigations. Steve Stasiukonis has worked in the field of Information Security since 1997, specializing in the use of technology to identify information security vulnerabilities, assessing risk and the collection and interpretation of digital network intelligence. As a part of that experience, Steve is an expert in Social Engineering. He is listed in Wikipedia as one of the most notable Social Engineers and has written and demonstrated actual social engineering efforts involving pretexting, phishing and physically compromising banks, data centers and other highly secure operations and facilities. Steve carries numerous security certifications by various organizations and also serves as a columnist for Information Week magazine and DarkReading.com

 
Tyler Wrightson
Founder and President
Leet Systems
 
Tyler Wrightson is the author of Advanced Persistent Threat Hacking and Wireless Network Security: A Beginner's Guide. Tyler is the founder and president of Leet Systems, which helps organizations solve their technical cyber security challenges. LeetSystems focuses on offensive security services such as Penetration Testing and Red Teaming to secure organizations against real world attackers. Tyler has over thirteen years experience in the IT security field across many industries including healthcare and financial services with extensive experience in many areas of technical security including networking, systems architecture, offensive security and penetration testing. Tyler holds industry certifications such CISSP, CCSP, CCNA, CCDA, and MCSE. Tyler has also taught classes for CCNA certification, wireless security, and network security. He has been a frequent speaker at industry conferences including NYS CyberSecurity Conference, Derbycon, BSides, Rochester Security Summit, ISACA, ISSA, and others. Follow his security blog at http://blog.leetsys.com.  

Joshua Young

Senior Consultant | Staff Technologist | Cyber Offense Booz | Allen | Hamilton
 

Josh is an army veteran who started his career supporting HHC 2-108 Infantry. During the company’s deployment to Afghanistan in 2012, Josh worked to support the network infrastructure for mission communications between RC West and RC North. When he came back, he transferred to 427 BSB out of Syracuse as the team lead for network security and infrastructure management. He pursued his passion for information security by going to SUNY Poly Tech and earning a Bachelor’s degree in Computer and Network Security. After supporting a Counter-UAS project with Alion, Josh worked as an Intelligence Analyst for Peraton, utilizing the Dark Web to locate and report on new strains of malware and persons of interest. After that, Josh found a home at Booz Allen Hamilton as a Penetration Tester and System Engineer with a specialization in Cross Domain Solutions. He has earned the Security+, C|EH, and PenTest+ certifications during his employment.